الاثنين، 14 مايو 2012

Removing Autorun.inf/Autorun.ini virus manually






METHOD I

You can easily remove the VB script viruses like MS32DLL.dll.vbs and others which works with the aid of autorun.inf in your harddrive. This virus is mostly transferred via USB pendrive which don’t have any write protect function. Although i recommend you to use a good virus removal software or script blocker. When you open any of the hard drives may be USB or primary hard disk. You will be directed to this visual basic script which drives your computer crazy. It becomes hard to access your harddrive. Here’s a way how to disable this script atleast. As it works with the help of autorun.inf you must be aware to find the autorun.inf file in your hard drive which is read-only and hidden.

NOTE: Remember this script also blocks some of the contents in Folder options . For example, “show the hidden files“.



So DOS, which is the best way for hackers as well as repairers to edit your computer. Do the following.
STEP 1: Locate the infected drive either C:, D:, E:, F, and so on.
STEP 2:
Now search for the file name autorun.inf using dir command. ” C:/dir autorun.inf (where C, is your drive)”
STEP 3:
I know that, it won’t discover any of the file name autorun.inf as it is the hidden one. Try the following: ” C:/dir/ah (where C is ur drive letter) Now you can see the files autorun.inf of approx 100+ Kb and MS32DLL.dll.vbs file.
STEP 4:
Autorun.inf is the Master and MS32DLL.dll.vbs is a worker. Autorun.inf gives order to work out on the computer. So first you must delete the file named autorun.inf try these codes. “C:/del/ah/f autorun.inf” I think the file is now deleted
STEP 5:
Now type following commands: “C:/copy con autorun.inf (Enter)
[AutoRun]
open=explorer.exep(Press F6 button and hit enter)
Now you are approx. done.
Now do the same steps for MS32DLL.dll.vbs file as i mentioned in STEP 4 Try to restart the computer You’ll see the result, if not worked better you use a better virus removable and be prepared for future. If you want to remove this virus first download your usb drives and ur hard drives. Don’t keep any backup. AND HEY DON’T forget about the program wscript.exe check if it is running or not in you taskmanager. It makes the vbs file work.



METHOD II


Alternative method to remove autorun.inf virus or ms32dll.dll.vbs
1-2. double click on My computer on Desktop ,
- choose Tool and select “Folder options”
- click on “View” tap select “Show Hidden files and folders” and un hake “Hide Extention….”
- and “Hide protected operating system file” (this selections are important to find the files you need to delete)
- then click “OK”
3. open Windows Task Manager (ctrl-alt-del) and select the “Processes” tap
- Click on “Image name” to sort File
- find “wscript.exe” and click on “End Process” (if there is more than one process with that name you have to end all of them)
- close the “Task Manager”
4. then you will click on Start and select “Search” and search for “autorun.inf” (Search the computer)
- you will then delete all the files that contains the text MS32DLL.dll.vbs (the virus) by pressing: SHIFT + DELETE. (There of course should not be Autorun.inf in the C rooth).
5. you will also delete the virus from the system (C:WINDOWS MS32DLL.dll.vbs) by pressing: SHIFT + DELETE
6. Next step is to edit the Register (Like always you have to be very care fool in the registry tools. Some mistake there can crash your computer)
- first, click on “Start” and select “Run” and type in “Regedit” and press “Enter”.
- select HKEY_LOCAL_MACHINE –> Software –>Microsoft –>Windows –> Current Version –> Run.
- find there “MS32DLL” and delete that entry.
6. Then select HKEY_CURRENT_USER –> Software –> Microsoft –> Internet Explorer –> Main. There you find “Window Title “Hacked by Godzilla”" and you should delete that entry. You can close the registry now.
7. next you will click on Start –> Run and type in “gpedit.msc” and press “Enter”. then you will open “Group Policy”.
- there you will select User Configuration –> Administrative Templates –> System –> and there you will double click on “Turn Off Autoplay”
- in the window there you should select “Enabled” and select “All drives” (they say in this Thai webside that select all turn of Autoplay will be safer for not getting viruses). Now you can close the Group Policy.
8. Next you will click on Start –> Run and type “msconfig” and press “Enter”.
- you will open “System Configuration Utility”.
- click on “Startup” tap
- find the file MS32DLL, choose Enable All, then unhake “MS32DLL”
- click Apply then OK to close
- then you will exit the “System Configuration Utility” and select “Exit Without Restart” when prompt.
9. After this you double click on My Computer and select “Tools” and “Folder Options” and “View” tap to change back there.
- select “Hide Extention…” and “Hide protected operating system file” and “Don’t show hidden files and folders”.
- then you will empty the “Recycle bin” and “Restart” your computer.

Hacking and crashing website using IP


Your friend or your enemy has made a little shitty website for whatever maybe a private server or anything.. And your feeling devious and want to crash it 
 TOOLS: 
Port Scanner 
 rDos 
HotSpotSheild Proxy! 


Step One: First we need to find the websites IP Adress. This is very easy todo. Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /’s)


Step Two: Now we must test to see if port 80 is open (it usually is).



This is very easy todo to Ok open up the port scanner you downloaded. Once in the port scanner type in your Victims ip that you got from step 1. It will ask you todo a range scan or a full scan (SELECT REANGE SCAN!) It will ask for conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and 81 for highest hit enter than hit cap Y. [X] = Closed [X] Vulnerable = Open


Step Three ALMOST DONE:


The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!) If port 80 is open your on your way to crashing!!
Ok open Up rDos that you download. Enter your victims ip that we got from step 1. It will ask you for the port to attack use port 80 that is why we scaned to make sure 80 was open! If it is closed it will not work. Hit enter.. *=Flooding -=Crashed Or didn’t connect! 

How to hack remote computer using IP Address



Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.
Well, both of the hacking has the same process. Let’s summarize what we must do.
  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.



For example,
ping www.google.com
will fetch the IP address of Google.com
a How to hack remote computer using IP Address
This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.
Now you got the IP address right? Is it online?
To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner to scan all open and venerable ports.
b How to hack remote computer using IP Address
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]
c How to hack remote computer using IP Address
You’ll be asked to input login information.
d How to hack remote computer using IP Address
If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools
.
In this way you’ll able to hack remove computer using only IP address

الجمعة، 27 أبريل 2012

Top Ten Youtube Hacks



 No.1 : Download Youtube videos without software

Just go to youtube video  that you want to download and type kick before youtube.com/… in URL
download youtube hacks
and press enter , after this will appear website where you’ll be able to download youtube video.


 No.2 : Embed Part Of A YouTube Video

Just append ?rel=0&start=38 to skip first 38s of the video. In general you can modify the value after start= to the number of seconds you want to skip the video for.
<iframe width="420" height="315" src="http://www.youtube.com/embed/JbNf0QMT3Eg?rel=0&start=38" frameborder="0" allowfullscreen ></iframe>

 No.3 : How To Watch Synchronized YouTube Videos

Just go to SynchTube and set up a “room” up to 50 other people with a chat window along the side so you can IM about what’s happening .
youtube hacks

 No.4 : How To Edit Youtube Videos Online

tubechop.com is online service that allows you to make your edited selection by sliding a bar along a timeline .
 hack to edit youtube video



 No.5 : How To Improve Youtube Quality

To watch any video in higher quality on Youtube, just add this at the end of the link: &fmt=18 (stereo, 480 x 270 resolution) or &fmt=22(stereo, 1280 x 720 resolution) . Somewhat like this;
improve yuality youtube hack
This is normal youtube links, you must add &fmt=18
youtube hack
After you’ve added &fmt=18 or &fmt=6, quality will

 No.6 : How To Disable Related Videos

Don’t want people to see other people’s content that may be related ,just add ‘?rel=0? to the end of the url part of the embed !
 <iframe width="420" height="315" src="http://www.youtube.com/embed/JbNf0QMT3Eg?rel=0" frameborder="0" allowfullscreen ></iframe>

No.7 : How To Add A Youtube Video To Your Presentation



If you work presentation in Powerpoint, then is very useful add videos to make presentation much interesting and to keep the attention of the audience. Let´s say you need to add video from youtube.com, for beginning , you should download video and convert in a format you can use in Powerpoint. There are many ways to do it, I personally use kickyoutube; the best way to download and convert video form youtube, at least by my opinion.

No.8 :How To Autoplay An Embedded Video
 <iframe width="420" height="315" src="http://www.youtube.com/embed/JbNf0QMT3Eg?rel=0&autoplay=1" frameborder="0" allowfullscreen ></iframe>

 No.9 : How To Convert YouTube Videos To Mp3

video2mp3.net allows you to convert youtube videos to MP3 files .
youtube hacks to convert

 No.10 : How To Watch YouTube Videos On TV

Connect your PC to TV and go to youtube.com/xl . It is a version of YouTube optimized  for watching YouTube videos on any large screen.

الأحد، 26 فبراير 2012

Transform your Business with Virtualization



Improve the efficiency and availability of IT resources and applications through virtualization. Start by eliminating the old “one server, one application” model and run multiple virtual machines on each physical machine. Free your IT admins from spending so much time managing servers rather than innovating. About 70% of a typical IT budget in a non-virtualized datacenter goes towards just maintaining the existing infrastructure, with little left for innovation.



An automated datacenter built on the production-proven VMware virtualization platform lets you respond to market dynamics faster and more efficiently than ever before. VMware vSphere delivers resources, applications—even servers—when and where they’re needed. VMware customers typically save 50-70% on overall IT costs by consolidating their resource pools and delivering highly available machines with VMware vSphere. Run multiple operating systems on a single computer including Windows, Linux and more. Let your Mac run Windows creating a virtual PC environment for all your Windows applications. Reduce capital costs by increasing energy efficiency and requiring less hardware while increasing your server to admin ratio Ensure your enterprise applications perform with the highest availability and performance Build up business continuity through improved disaster recovery solutions and deliver high availability throughout the datacenter Improve enterprise desktop management & control with faster deployment of desktops and fewer support calls due to application conflicts

  What is Virtualization?

Today’s x86 computer hardware was designed to run a single operating system and a single application, leaving most machines vastly underutilized. Virtualization lets you run multiple virtual machines on a single physical machine, with each virtual machine sharing the resources of that one physical computer across multiple environments. Different virtual machines can run different operating systems and multiple applications on the same physical computer. While others are leaping aboard the virtualization bandwagon now, VMware is the market leader in virtualization. Our technology is production-proven, used by more than 170,000 customers, including 100% of the Fortune 100.

How Does Virtualization Work?

 The VMware virtualization platform is built on a business-ready architecture. Use software such as VMware vSphere to transform or “virtualize” the hardware resources of an x86-based computer—including the CPU, RAM, hard disk and network controller—to create a fully functional virtual machine that can run its own operating system and applications just like a “real” computer. Each virtual machine contains a complete system, eliminating potential conflicts. VMware virtualization works by inserting a thin layer of software directly on the computer hardware or on a host operating system. This contains a virtual machine monitor or “hypervisor” that allocates hardware resources dynamically and transparently. Multiple operating systems run concurrently on a single physical computer and share hardware resources with each other. By encapsulating an entire machine, including CPU, memory, operating system, and network devices, a virtual machine is completely compatible with all standard x86 operating systems, applications, and device drivers. You can safely run several operating systems and applications at the same time on a single computer, with each having access to the resources it needs when it needs them.

  Build your Datacenter on a Flexible Architecture



Virtualizing a single physical computer is just the beginning. You can build an entire virtual infrastructure, scaling across hundreds of interconnected physical computers and storage devices with VMware vSphere, a proven virtualization platform used as the foundation for building private and public clouds. You don’t need to assign servers, storage, or network bandwidth permanently to each application. Instead, your hardware resources are dynamically allocated when and where they’re needed within your private cloud. Your highest priority applications always have the necessary resources without wasting money on excess hardware only used at peak times. Connect this private cloud to a public cloud to create a hybrid cloud, giving your business the flexibility, availability and scalability it needs to thrive.


  Manage your Resources with the Lowest TCO


 It’s not just virtualization that’s important. You need the management tools to run those machines and the ability to run the wide selection of applications and infrastructure services your business depends on. VMware lets you increase service availability while eliminating error-prone manual tasks. IT operations are more efficient and effective with VMware virtualization. Your staff will handle double or triple the number of servers, giving users access to the services they need while retaining centralized control. Deliver built-in availability, security, and performance across the board, from the desktop to the datacenter.

السبت، 19 نوفمبر 2011

Office Material Management System



Office Material Management System (OMMS) is a powerful management information system for office material (e.g., printing paper, stationery, calculators, cameras, computers, printers) and inventory.
By analyzing the materials inventory and usage tracking information, will increase the utilization of materials and reduce material waste, will reduce costs and improve enterprise efficiency.

Function Features:
1. Inventory management
2. Material management
3. Material usage trace
4. Material consumption statistics
5. Staff in charge of supplies
6. Quickly locate materials
7. Forecast inventory
8. Analysis material usage by department and employee

Benefits :
1. Lower inventory cost , reduce inventory space.
2. Imporve material usage
3. Quickly locate materials
4. In the employee turnover process, employees will know what materials should be returned.
5. Speed up the operation of office material management.


Additional Outstanding Feature:
1. Powerful system management capabilities
2. Wizard support
3. Company custom number format
4. Shortcut Management
5. Database Creater
6. Auto Updator
7. Database Backup And Resore Assistant
8. FAQ Support

System Requirements:
Minimum System Requirements
OS : Microsoft Windows XP
RAM : 128M
CPU : Intel/AMD compatible at 750 MHz or above

Recommended System Requirements
OS : Microsoft Windows XP/2003/Vista/2008/Win7 with all latest updates installed
RAM : 512M or higher
CPU : Intel/AMD compatible at 750 MHz or above

الخميس، 10 نوفمبر 2011

Top Ten Secrets of Share Point



1-Use Custom Columns to Improve Search Results

Categorizing content helps users effectively find documents within the site. This can be done via SharePoint through the use of custom columns or meta data. Create these columns at the global level of the site collection and add them to the required content types. The document libraries or lists associated with these content types will then inherit these custom columns.

These custom columns can also be set as required fields. For example, you may include a column identifying the Sales Territory a document is related to, making it easier for the Sales staff to filter their search results quickly by their relevant territory. This also improves the ranking of the search results.

2-Managing a site in SharePoint 2010 Using PowerShell cmdlets

In SharePoint 2010 you can manage sites through Windows PowerShell. You can create new sites in a site collection using the New-SPWeb cmdlet:

New-SPWeb http://SP/TeamSite -Template "STS#0" –Name "Team Site" `
-Description "Description of Site" –AddToTopNav –UseParentTopNav

You can retrieve an existing site using the Get-SPWeb cmdlet:

Get-SPWeb http://SP/TeamSite
You can configure a site through the Set-SPWeb cmdlet:

Get-SPWeb http://SP/TeamSite | Set-SPWeb -Description "New Description"
And finally, you can remove a site using the Remove-SPWeb cmdlet:

Remove-SPWeb http://SP/TeamSite -Confirm:$false
Setting the –Confirm switch parameter to $false omits the confirmation returned from PowerShell.

3-Use BLOB Caching to increase performance

BLOB caching, or disk-based caching, is an out of the box (OOTB) caching mechanism that is built into the MOSS 2007 and SharePoint Server 2010 platforms. It is commonly used to speed-up access to large and relatively static resources that are stored in content databases, such as images, videos, javascript files, and more. Performance improvements are gained by storing these assets on web front-ends (WFEs) once they’ve been requested by a client. This allows SharePoint to serve subsequent requests for such assets directly from WFEs instead of round-tripping to the content database each time a request for such an asset is received. For most SharePoint sites, this type of caching can significantly lighten the load on your SQL Servers and back-end network.

BLOB Caching is controlled through the web.config file for each of the IIS web sites that is associated with a Web application, and it is not enabled by default. Enabling BLOB caching is as simple as setting the enabled attribute to true in the web.config element as shown below.



4-Backup and restore watch-outs for SQL Server encryption
Starting with SQL Server 2008 Enterprise and Developer editions, databases can be encrypted on disk using transparent data encryption, or TDE. SharePoint has no qualms with TDE, and SharePoint’s databases can be encrypted without issue using TDE.

When backing up and restoring databases that are encrypted, though, be careful. Encryption is handled by SQL Server, and such encryption “flies below the radar” of SharePoint. For backup strategies that target SQL Server databases, be sure your plan includes protection for TDE certificates and keys that are in-use by SQL Server. Failure to include these items leaves you at risk for restoring databases with inaccessible encrypted content.


5-Use a Thesaurus File to create synonyms or replacements in Search Queries
Thesaurus Files are a way for administrators to improve search results by creating synonyms or replacement words used in their queries. For example, you can create a synonym for the word SharePoint so when a user is making a search for the word WSS, you would also get results with the word SharePoint.

The Thesaurus Files are located on the SharePoint server in the folder: %ProgramFiles%\Microsoft Office Servers\14.0\Data\Applications\[GUID]\Config where the [GUID] is the GUID of your Search Service Application.

6-Hide a list in SharePoint '10

You can use Windows PowerShell to hide a list in SharePoint 2010. Simply store an instance of an SPList Object, set the Hidden property to $true and update the SPList object.

PS > $spWeb = Get-SPWeb http://sp01/site
PS > $spList = $spWeb.GetList("http://sp01/site/Lists/MyList")
PS > $spList.Hidden = $true
PS > $spList.Update()

7-Understand database mirroring requirements for disaster recovery purpose

SharePoint 2010 is mirroring aware and utilizes the FailoverPartner keyword in its database connection strings to identify a SQL Server instance that is used for mirroring purposes. Upon learning this, it might be tempting to jump right in and start mirroring SharePoint databases for redundancy. Before doing so, though, you should be aware that the following requirements apply:

Less than 1ms latency between principal and mirror SQL Server instances
1GB/s bandwidth or greater between principal and mirror SQL Server instances
Principal and mirror instances must be running the same version and edition of SQL Server
Mirrored databases must use the Full recovery model
High safety with automatic failover (that is, synchronous mirroring with witness server) is recommended
Mirroring is certainly useful, but as the aforementioned list demonstrates: it shouldn’t be implemented without careful planning and infrastructure design.

8-find information about your SharePoint database

You can use the Get-SPDatabase cmdlet to display information about the SharePoint databases.

PS > Get-SPDatabase
The example above displays all SharePoint databases. If you want to display a specific Database, use the identity parameter followed by the database ID.

PS > Get-SPDatabase -Identity f9213ca2-3604-42e5-b6cf-92740fbed83a


9-Find information about Farm configurations

You can use the Get-SPFarmConfig cmdlet to retrieve global settings for the local farm. The cmdlet returns information for items that are not on the SPFarm Object.

PS > Get-SPFarmConfig
WorkflowBatchSize : 100
WorkflowPostponeThreshold : 15
WorkflowEventDeliveryTimeout : 5
DataFormWebPartAutoRefreshEnabled : True
ASPScriptOptimizationEnabled : True

10-Set Web Applications outgoing email address

You can use PowerShell to set a Web Applications outgoing email address and SMTP Server. Simply use the Set-SPWebApplication cmdlet.

PS > Set-SPWebApplication -Identity http://SP01 `
>> -OutgoingEmailAddress mail@domain.com `
>> -SMTPServer ex01.domain.com